-
Notifications
You must be signed in to change notification settings - Fork 32
Description
Problem description
The PR #582 introduced more restrictive requirements into Commonalities 0.7-rc1 as required by OWASP.
For example, PR #582 introduces the general requirement "If the data type is string, maxLength property or enum construct MUST be used to constrain values.", while the OWASP issue is an "Unrestricted Resource Consumption", i.e. only on input strings, either in a queryline or path parameter or in a POST, PATCH or PUT request body. Meaning, OWASP does not require string constrains for string, which are generated by the API provider function.
Expected behavior
Review the OWASP guideline and check, whether the restrictions should only be applied to input parameters (i.e. strings or arrays or integers).
Discuss, whether restrictions should also be applied to output parameters, i.e. parameter values, which are generated by the API provider function.
Give some guidance, how to determine the restrictions. The principle can be for example, that the API specification is not restricting the deployments (e.g. recommend usage of the maximal possible value) and recommend implementations for further restricting it (with clear error code support).
Alternative solution
Additional context